Metrics
Affected Vendors & Products
Fri, 31 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol. | The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active. |
| Title | EXCHANGE OF SENSITIVE INFORMATION IN CLEAR TEXT | HIJACKING OF THE TOKEN AND GAINING ACCESS |
| Weaknesses | CWE-319 | CWE-613 |
| References |
|
|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Fri, 31 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol. | |
| Title | EXCHANGE OF SENSITIVE INFORMATION IN CLEAR TEXT | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: S21sec
Published: 2025-10-31T13:42:32.743Z
Updated: 2025-10-31T17:48:32.514Z
Reserved: 2025-10-31T13:13:35.299Z
Link: CVE-2025-64386
Updated: 2025-10-31T17:48:26.777Z
Status : Received
Published: 2025-10-31T14:16:13.510
Modified: 2025-10-31T14:16:13.510
Link: CVE-2025-64386
No data.
ReportizFlow